Uniget Command Injection Vulnerability via Malicious Metadata
Uniget is vulnerable to command injection because the `check` field is loaded directly from untrusted JSON metadata without validation, allowing an attacker to execute arbitrary shell commands on the victim's system when performing common uniget operations.
Uniget is vulnerable to a command injection vulnerability (CVE-2026-45152) stemming from the unsafe execution of the check field within metadata files. This occurs because the check field, used for version checks, is executed via /bin/bash -c without proper sanitization or validation. An attacker can inject arbitrary shell commands by crafting malicious metadata. Common uniget operations such as describe, install, update, or inspect will trigger the vulnerability. This vulnerability affects uniget versions prior to 0.27.1, and successful exploitation leads to arbitrary code execution with the privileges of the user running uniget.
Attack Chain
- The attacker crafts a malicious JSON metadata file containing a payload within the
checkfield. - The attacker places the malicious metadata file in the uniget metadata cache directory (
~/.local/var/cache/uniget/). - The user executes a uniget command such as
describe,install,update, orinspecttargeting a tool defined in the malicious metadata. - Uniget loads the metadata for the specified tool using
json.Unmarshal(). - The
tool.Checkfield is populated with the attacker-controlled command from the JSON metadata. - Uniget executes the command defined in the
tool.Checkfield using/bin/bash -c. - The shell interprets any shell metacharacters present in the command, resulting in command injection.
- The attacker’s injected commands are executed with the privileges of the user running uniget, potentially leading to complete system compromise.
Impact
This command injection vulnerability allows an attacker to execute arbitrary code on a vulnerable system. This can lead to the exfiltration of sensitive data, installation of malware, or modification of system configurations. Compromised systems could be leveraged for further attacks within a network. This issue primarily affects users who import or process attacker-controlled metadata, potentially including CI/CD environments using uniget automation. Successful exploitation grants the attacker the same privileges as the user running uniget, potentially leading to complete system compromise.
Recommendation
- Upgrade to uniget version 0.27.1 or later to patch CVE-2026-45152.
- Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.
- If upgrading is not immediately feasible, avoid using uniget with untrusted metadata sources.
- Monitor process creation events for
/bin/bash -cexecuting commands sourced from uniget metadata locations, as detected by the Sigma rules.
Detection coverage 2
Detect CVE-2026-45152 Exploitation — Uniget Command Injection via Bash Execution
highDetects CVE-2026-45152 exploitation — execution of bash with -c parameter and commands originating from the uniget metadata cache directory indicating a command injection attempt.
Detect CVE-2026-45152 Attempt — Uniget Metadata Cache Modification
mediumDetects attempts to create or modify Uniget metadata cache files, potentially indicating malicious activity associated with CVE-2026-45152 exploitation.
Detection queries are available on the platform. Get full rules →